SlideShare una empresa de Scribd logo
1 de 24
Combating Cyber crimes-Combating Cyber crimes-
Law &Law &
Enforcement in IndiaEnforcement in India
Seminar on Information Technology Acts
Submitted to :
Mr. Pranjal Bansal
BY:
Vishal Soni
4th
year / 8th
Sem
Computer Engineering
08CE97
Introduction to CyberIntroduction to Cyber
crimecrime
 Computer CrimeComputer Crime ,, E-E-
CrimeCrime,, Hi-Tech CrimeHi-Tech Crime oror
Electronic CrimeElectronic Crime isis
where awhere a computercomputer is theis the
target of atarget of a crimecrime or is theor is the
means adopted to commit ameans adopted to commit a
crime.crime.
 Most of these crimes areMost of these crimes are
not new. Criminals simplynot new. Criminals simply
devise different ways todevise different ways to
undertake standard criminalundertake standard criminal
activities such asactivities such as fraudfraud,,
theft, blackmail, forgery,theft, blackmail, forgery,
and embezzlement usingand embezzlement using
the new medium, oftenthe new medium, often
involving the Internetinvolving the Internet
Computer vulnerabilityComputer vulnerability
 Computers store huge amounts of data in small spacesComputers store huge amounts of data in small spaces
 Ease of accessEase of access
 Complexity of technologyComplexity of technology
 Human errorHuman error
 One of the key elements that keeps most members of any societyOne of the key elements that keeps most members of any society
honest is fear of being caught — the deterrence factor. Cyberspacehonest is fear of being caught — the deterrence factor. Cyberspace
changes two of those rules. First, it offers the criminal an opportunitychanges two of those rules. First, it offers the criminal an opportunity
of attacking his victims from the remoteness of a different continentof attacking his victims from the remoteness of a different continent
and secondly, the results of the crime are not immediately apparent.and secondly, the results of the crime are not immediately apparent.
 Need new laws and upgraded technology to combat cyber crimesNeed new laws and upgraded technology to combat cyber crimes
Types of Cyber crimesTypes of Cyber crimes
 Credit card fraudsCredit card frauds
 Cyber pornographyCyber pornography
 Sale of illegal articles-Sale of illegal articles-
narcotics, weapons, wildlifenarcotics, weapons, wildlife
 Online gamblingOnline gambling
 Intellectual Property crimes-Intellectual Property crimes-
software piracy, copyrightsoftware piracy, copyright
infringement, trademarksinfringement, trademarks
violations, theft of computerviolations, theft of computer
source codesource code
 Email spoofingEmail spoofing
 ForgeryForgery
 DefamationDefamation
 Cyber stalking (section 509Cyber stalking (section 509
IPC)IPC)
 PhisingPhising
 Cyber terrorismCyber terrorism
Crime against persons
Crime against Government
Crime against property
Computer VirusesComputer Viruses
 VirusesViruses
 A computer virus is aA computer virus is a
computer program thatcomputer program that
can infect othercan infect other
computer programs bycomputer programs by
modifying them in suchmodifying them in such
a way as to include aa way as to include a
(possibly evolved) copy(possibly evolved) copy
of it. Note that aof it. Note that a
program does not haveprogram does not have
to perform outrightto perform outright
damage (such asdamage (such as
deleting or corruptingdeleting or corrupting
files) in order to befiles) in order to be
called a "virus".called a "virus".
Viruses
File
infectors
Boot record
infectors
Boot and
file
viruses
Cyber crimes
Hacking
Information
Theft
E-mail
bombing
Salami
attacks
Denial of
Service
attacks
Trojan
attacks
Web jacking
Combating cyber crimesCombating cyber crimes
 Technological measures-Technological measures-
Public key cryptography,Public key cryptography,
Digital signatures ,Firewalls,Digital signatures ,Firewalls,
honey potshoney pots
 Cyber investigation-Cyber investigation-
Computer forensics is theComputer forensics is the
process of identifying,process of identifying,
preserving, analyzing andpreserving, analyzing and
presenting digital evidence inpresenting digital evidence in
a manner that is legallya manner that is legally
acceptable in courts of law.acceptable in courts of law.
 These rules of evidenceThese rules of evidence
include admissibility (ininclude admissibility (in
courts), authenticity (relationcourts), authenticity (relation
to incident), completeness,to incident), completeness,
reliability and believability.reliability and believability.
 Legal framework-laws &Legal framework-laws &
enforcementenforcement
International initiativesInternational initiatives
 Representatives from the 26Representatives from the 26
Council of Europe members, theCouncil of Europe members, the
United States, Canada, Japan andUnited States, Canada, Japan and
South Africa in 2001 signed aSouth Africa in 2001 signed a
convention on cybercrime in effortsconvention on cybercrime in efforts
to enhance internationalto enhance international
cooperation in combatingcooperation in combating
computer-based crimes.computer-based crimes.
TheThe Convention on CybercrimeConvention on Cybercrime,,
drawn up by experts of the Councildrawn up by experts of the Council
of Europe, is designed toof Europe, is designed to
coordinate these countries' policiescoordinate these countries' policies
and laws on penalties on crimes inand laws on penalties on crimes in
cyberspace, define the formulacyberspace, define the formula
guaranteeing the efficientguaranteeing the efficient
operation of the criminal andoperation of the criminal and
judicial authorities, and establishjudicial authorities, and establish
an efficient mechanism foran efficient mechanism for
international cooperation.international cooperation.
 In 1997, TheIn 1997, The G-8 MinistersG-8 Ministers agreedagreed
to ten "Principles to Combat High-to ten "Principles to Combat High-
Tech Crime" and an "Action PlanTech Crime" and an "Action Plan
to Combat High-Tech Crimeto Combat High-Tech Crime."."
 Main objectives-Main objectives-
 Create effective cyber crimeCreate effective cyber crime
lawslaws
 Handle jurisdiction issuesHandle jurisdiction issues
 Cooperate in internationalCooperate in international
investigationsinvestigations
 Develop acceptableDevelop acceptable
practices for search andpractices for search and
seizureseizure
 Establish effectiveEstablish effective
public/private sectorpublic/private sector
interactioninteraction
Frequency of incidents of Cyber crimes in India
Source: Survey conducted by ASCL
Denial of Service: Section
43
Virus: Section: 66, 43
Data Alteration: Sec. 66
U/A Access: Section 43
Email Abuse: Sec. 67,
500, Other IPC Sections
Data Theft: Sec 66, 65
99
10
No. of Indian web-sites defaced
441
1002
2219
7039
0
1000
2000
3000
4000
5000
6000
7000
8000
1998 1999 2000 2001
11
Number of Indian sites hacked
Site of BARC-panic all around
0
6
12
25
0
5
10
15
20
25
1998 1999 2000 2001
2001 CSI/FBI Computer Crime and Security Survey
Of the organizations suffering security compromises in the last
year– 95% had Firewalls and 61%had IDSs
981009896Anti-virus software
90929389Access Control
%%%%
SECURITY TECHNOLOGIES
USED
64626150Encrypted Files
95789181Firewalls
61504235Intrusion Detection Systems
2001200019991998
•False sense of security – “We already have a Firewall”
12
What is India inc’s biggestWhat is India inc’s biggest
threat?threat?
 Cyber crime is now a bigger threat to India Inc thanCyber crime is now a bigger threat to India Inc than
physical crime. In a recent survey by IBM, a greaterphysical crime. In a recent survey by IBM, a greater
number of companies (44%) listed cyber crime as anumber of companies (44%) listed cyber crime as a
bigger threat to their profitability than physical crimebigger threat to their profitability than physical crime
(31%).(31%).
The cost of cyber crime stems primarily from loss ofThe cost of cyber crime stems primarily from loss of
revenue, loss of market capitalisation, damage torevenue, loss of market capitalisation, damage to
the brand, and loss of customers, in that order.the brand, and loss of customers, in that order.
About 67% local Chief Information Officers (CIOs)About 67% local Chief Information Officers (CIOs)
who took part in the survey perceived cyber crimewho took part in the survey perceived cyber crime
as more costly, compared to the global benchmarkas more costly, compared to the global benchmark
of 50%.of 50%.
Combating Cyber crime-Combating Cyber crime-
Indian legal frameworkIndian legal framework
 Information Technology Act, 2000-came into force on 17Information Technology Act, 2000-came into force on 17
October 2000October 2000
 Extends to whole of India and also applies to any offence orExtends to whole of India and also applies to any offence or
contravention there under committed outside India by anycontravention there under committed outside India by any
person {section 1 (2)}person {section 1 (2)}
 read with Section 75- Act applies to offence or contraventionread with Section 75- Act applies to offence or contravention
committed outside Indiacommitted outside India by any personby any person irrespective of hisirrespective of his
nationality,nationality, if such act involves a computer, computer systemif such act involves a computer, computer system
oror network located in Indianetwork located in India
 Section 2 (1) (a) –”Access” means gaining entry intoSection 2 (1) (a) –”Access” means gaining entry into
,instructing or communicating with the logical, arithmetic or,instructing or communicating with the logical, arithmetic or
memory function resources of a computer, computermemory function resources of a computer, computer
resource or networkresource or network
 IT Act confers legal recognition to electronic records andIT Act confers legal recognition to electronic records and
digital signatures (section 4,5 of the IT Act,2000)digital signatures (section 4,5 of the IT Act,2000)
Civil Wrongs under ITCivil Wrongs under IT
ActAct
 Chapter IX of IT Act, Section 43Chapter IX of IT Act, Section 43
 WhoeverWhoever without permissionwithout permission of owner of theof owner of the
computercomputer
– Secures access (mere U/A access)Secures access (mere U/A access)
 Not necessarily through a networkNot necessarily through a network
– Downloads, copies, extracts any dataDownloads, copies, extracts any data
– Introduces or causes to be introduced any viruses orIntroduces or causes to be introduced any viruses or
contaminantcontaminant
– Damages or causes to be damaged any computerDamages or causes to be damaged any computer
resourceresource
 Destroy, alter, delete, add, modify or rearrangeDestroy, alter, delete, add, modify or rearrange
 Change the format of a fileChange the format of a file
– Disrupts or causes disruption of any computer resourceDisrupts or causes disruption of any computer resource
 Preventing normal continuance ofPreventing normal continuance of
– Denies or causes denial of access by any meansDenies or causes denial of access by any means
 Denial of service attacksDenial of service attacks
– Assists any person to do any thing aboveAssists any person to do any thing above
 Rogue Websites, Search Engines, Insiders providingRogue Websites, Search Engines, Insiders providing
vulnerabilitiesvulnerabilities
– Charges the services availed by a person to theCharges the services availed by a person to the
account of another person by tampering oraccount of another person by tampering or
manipulating any computer resourcemanipulating any computer resource
 Credit card frauds, Internet time theftsCredit card frauds, Internet time thefts
– Liable to pay damages not exceeding Rs. OneLiable to pay damages not exceeding Rs. One
crore to the affected partycrore to the affected party
– Investigation byInvestigation by
– ADJUDICATING OFFICERADJUDICATING OFFICER
– Powers of a civil courtPowers of a civil court
Section 65: Source CodeSection 65: Source Code
 Most important asset of software companiesMost important asset of software companies
 ““Computer Source Code" means the listingComputer Source Code" means the listing
of programmes, computer commands,of programmes, computer commands,
design and layoutdesign and layout
 IngredientsIngredients
– Knowledge or intentionKnowledge or intention
– Concealment, destruction, alterationConcealment, destruction, alteration
– computer source code required to be kept orcomputer source code required to be kept or
maintained by lawmaintained by law
 PunishmentPunishment
– imprisonment up to three years and / orimprisonment up to three years and / or
– fine up to Rs. 2 lakhfine up to Rs. 2 lakh
Section 66: Hacking
• Ingredients
– Intention or Knowledge to cause wrongful loss
or damage to the public or any person
– Destruction, deletion, alteration, diminishing
value or utility or injuriously affecting
information residing in a computer resource
• Punishment
– imprisonment up to three years, and / or
– fine up to Rs. 2 lakh
• Cognizable, Non Bailable,
18
Section 66 covers data theft aswell as data alterationSection 66 covers data theft aswell as data alteration
Sec. 67. PornographySec. 67. Pornography
 IngredientsIngredients
– Publishing or transmitting or causing to be publishedPublishing or transmitting or causing to be published
– in the electronic form,in the electronic form,
– Obscene materialObscene material
 PunishmentPunishment
– On first convictionOn first conviction
 imprisonment of either description up to five years andimprisonment of either description up to five years and
 fine up to Rs. 1 lakhfine up to Rs. 1 lakh
– On subsequent convictionOn subsequent conviction
 imprisonment of either description up to ten years andimprisonment of either description up to ten years and
 fine up to Rs. 2 lakhfine up to Rs. 2 lakh
 Section coversSection covers
– Internet Service Providers,Internet Service Providers,
– Search engines,Search engines,
– Pornographic websitesPornographic websites
 Cognizable, Non-Bailable, JMIC/ Court of SessionsCognizable, Non-Bailable, JMIC/ Court of Sessions
Sec 69: Decryption ofSec 69: Decryption of
informationinformation
 IngredientsIngredients
– Controller issues order to Government agency toController issues order to Government agency to
intercept any information transmitted through anyintercept any information transmitted through any
computer resource.computer resource.
– Order is issued in the interest of theOrder is issued in the interest of the
 sovereignty or integrity of India,sovereignty or integrity of India,
 the security of the State,the security of the State,
 friendly relations with foreign States,friendly relations with foreign States,
 public order orpublic order or
 preventing incitement for commission of a cognizablepreventing incitement for commission of a cognizable
offenceoffence
– Person in charge of the computer resource fails toPerson in charge of the computer resource fails to
extend all facilities and technical assistance toextend all facilities and technical assistance to
decrypt the information-punishment upto 7 years.decrypt the information-punishment upto 7 years.
Sec 70 Protected SystemSec 70 Protected System
 IngredientsIngredients
– Securing unauthorised access or attempting toSecuring unauthorised access or attempting to
secure unauthorised accesssecure unauthorised access
– to ‘protected system’to ‘protected system’
 Acts covered by this section:Acts covered by this section:
– Switching computer on / offSwitching computer on / off
– Using installed software / hardwareUsing installed software / hardware
– Installing software / hardwareInstalling software / hardware
– Port scanningPort scanning
 PunishmentPunishment
– Imprisonment up to 10 years and fineImprisonment up to 10 years and fine
 Cognizable, Non-Bailable, Court of SessionsCognizable, Non-Bailable, Court of Sessions
Cyber crimes punishableCyber crimes punishable
under various Indianunder various Indian
lawslaws Sending pornographic or obscene emails are punishable under Section 67 of the IT Act.
 An offence under this section is punishable on first conviction with imprisonment for a
term, which may extend to five years and with fine, which may extend to One lakh
rupees.
 In the event of a second or subsequent conviction the recommended punishment is
imprisonment for a term, which may extend to ten years and also with fine which may
extend to Two lakh rupees.
 Emails that are defamatory in nature are punishable under Section 500 of the Indian
Penal Code (IPC), which recommends an imprisonment of upto two years or a fine or
both.
 Threatening emails are punishable under the provisions of the IPC pertaining to criminal
intimidation, insult and annoyance (Chapter XXII), extortion (Chapter XVII)
 Email spoofing
Email spoofing is covered under provisions of the IPC relating to
fraud, cheating by personation (Chapter XVII), forgery (Chapter XVIII)
Arms ActOnline sale of Arms
Sec. 383 IPCWeb-Jacking
NDPS ActOnline sale of Drugs
Sec 416, 417, 463 IPCEmail spoofing
Sec 420 IPCBogus websites, cyber frauds
Sec 463, 470, 471 IPCForgery of electronic records
Sec 499, 500 IPCSending defamatory messages by email
Sec 503 IPCSending threatening messages by email
Computer Related Crimes under IPC
and Special Laws
23
Better EnforcementBetter Enforcement
initiativesinitiatives
 Mumbai Cyber lab is a joint initiative of Mumbai police andMumbai Cyber lab is a joint initiative of Mumbai police and
NASSCOM –more exchange and coordination of this kindNASSCOM –more exchange and coordination of this kind
 Suggested amendments to the IT Act,2000-new provisions forSuggested amendments to the IT Act,2000-new provisions for
child pornography, etcchild pornography, etc
 More Public awareness campaignsMore Public awareness campaigns
 Training of police officers to effectively combat cyber crimesTraining of police officers to effectively combat cyber crimes
 More Cyber crime police cells set up across the countryMore Cyber crime police cells set up across the country
 Effective E-surveillanceEffective E-surveillance
 Websites aid in creating awareness and encouragingWebsites aid in creating awareness and encouraging
reporting of cyber crime cases.reporting of cyber crime cases.
 Specialised Training of forensic investigators and expertsSpecialised Training of forensic investigators and experts
 Active coordination between police and other law enforcementActive coordination between police and other law enforcement
agencies and authorities is required.agencies and authorities is required.

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital age
 
Cyber crime & security final tapan
Cyber crime & security final tapanCyber crime & security final tapan
Cyber crime & security final tapan
 
cyber crime - slideshare by jayed hossain jibon
cyber crime - slideshare  by  jayed hossain jiboncyber crime - slideshare  by  jayed hossain jibon
cyber crime - slideshare by jayed hossain jibon
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cyber crime.ppt
Cyber crime.pptCyber crime.ppt
Cyber crime.ppt
 
cyber crime
cyber crimecyber crime
cyber crime
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)
 
Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security Cyber Criminal and Cyber Security
Cyber Criminal and Cyber Security
 

Destacado

Present Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidencePresent Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidenceShahid Jamal Tubrazy
 
Ch 8 Property Crimes
Ch 8 Property CrimesCh 8 Property Crimes
Ch 8 Property Crimesrharrisonaz
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sDhurba Mainali
 
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009ClubHack
 
Rohas - State of Cyber Law in India - ClubHack2008
Rohas - State of Cyber Law in India - ClubHack2008Rohas - State of Cyber Law in India - ClubHack2008
Rohas - State of Cyber Law in India - ClubHack2008ClubHack
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in IndiaShankey Gupta
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime pptAsish Verma
 
Internet Security and Legal Compliance: Cyber Law in India
Internet Security and Legal Compliance: Cyber Law in IndiaInternet Security and Legal Compliance: Cyber Law in India
Internet Security and Legal Compliance: Cyber Law in IndiaRodney D. Ryder
 
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...n|u - The Open Security Community
 
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaIntroduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaMaxwell Ranasinghe
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In PakistanTaha Mehmood
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIAAnish Rai
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e businessRahul Kumar
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippinesian_oguis
 

Destacado (20)

Present Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidencePresent Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital Evidence
 
Isys20261 lecture 04
Isys20261 lecture 04Isys20261 lecture 04
Isys20261 lecture 04
 
Ch 8 Property Crimes
Ch 8 Property CrimesCh 8 Property Crimes
Ch 8 Property Crimes
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
Rohas nagpal _it_act_2000_vs_2008 - ClubHack2009
 
Rohas - State of Cyber Law in India - ClubHack2008
Rohas - State of Cyber Law in India - ClubHack2008Rohas - State of Cyber Law in India - ClubHack2008
Rohas - State of Cyber Law in India - ClubHack2008
 
The cyber law regime in India
The cyber law regime in IndiaThe cyber law regime in India
The cyber law regime in India
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Asis Verma cyber crime ppt
Asis Verma cyber crime pptAsis Verma cyber crime ppt
Asis Verma cyber crime ppt
 
E transaction
E transactionE transaction
E transaction
 
Internet Security and Legal Compliance: Cyber Law in India
Internet Security and Legal Compliance: Cyber Law in IndiaInternet Security and Legal Compliance: Cyber Law in India
Internet Security and Legal Compliance: Cyber Law in India
 
E governance in india
E governance in indiaE governance in india
E governance in india
 
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
nullcon 2010 - Comparative analysis of “The IT Act, 2000″ and The IT(amendmen...
 
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri LankaIntroduction to Law relating to e commerce and computer crimes in Sri Lanka
Introduction to Law relating to e commerce and computer crimes in Sri Lanka
 
Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
Security issues in e business
Security issues in e businessSecurity issues in e business
Security issues in e business
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
Computer crime
 Computer crime Computer crime
Computer crime
 

Similar a SITA LAB PPT (XYBER CRIME)

Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p ptHemant
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & securityMehediHasan996
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Gol D Roger
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayVinay Pancholi
 
Cyber Crime Challenges in the Middle East
Cyber Crime Challenges in the Middle EastCyber Crime Challenges in the Middle East
Cyber Crime Challenges in the Middle EastMohamed N. El-Guindy
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011Andrea Rossetti
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and lawsAjnish Rana
 
M1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdfM1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdfShylesh BC
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd Iaetsd
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesTushar B Kute
 
My presentation isv conference 7th jan 2011
My presentation isv conference 7th jan 2011My presentation isv conference 7th jan 2011
My presentation isv conference 7th jan 2011Prof. (Dr.) Tabrez Ahmad
 

Similar a SITA LAB PPT (XYBER CRIME) (20)

Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber crime p pt
Cyber crime p ptCyber crime p pt
Cyber crime p pt
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Cyber Crime Challenges in the Middle East
Cyber Crime Challenges in the Middle EastCyber Crime Challenges in the Middle East
Cyber Crime Challenges in the Middle East
 
UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
M1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdfM1-01-CybercrimeIntroduction.pdf
M1-01-CybercrimeIntroduction.pdf
 
Tracking and Surveillance
Tracking and SurveillanceTracking and Surveillance
Tracking and Surveillance
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Iaetsd cyber crimeand
Iaetsd cyber crimeandIaetsd cyber crimeand
Iaetsd cyber crimeand
 
MIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical ChallengesMIS 21 Security and Ethical Challenges
MIS 21 Security and Ethical Challenges
 
My presentation isv conference 7th jan 2011
My presentation isv conference 7th jan 2011My presentation isv conference 7th jan 2011
My presentation isv conference 7th jan 2011
 

Más de Asish Verma

Major seminar presentation Cloud Computing
Major seminar presentation Cloud Computing Major seminar presentation Cloud Computing
Major seminar presentation Cloud Computing Asish Verma
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)Asish Verma
 
SITA LAB REPORT (I.P)
SITA LAB REPORT (I.P)SITA LAB REPORT (I.P)
SITA LAB REPORT (I.P)Asish Verma
 
Major pro lab synopsis
Major pro lab synopsisMajor pro lab synopsis
Major pro lab synopsisAsish Verma
 
MINOR PROZECT REPORT on WINDOWS SERVER
MINOR PROZECT REPORT on WINDOWS SERVERMINOR PROZECT REPORT on WINDOWS SERVER
MINOR PROZECT REPORT on WINDOWS SERVERAsish Verma
 
Pro lab synopsis (cert)
Pro lab synopsis (cert)Pro lab synopsis (cert)
Pro lab synopsis (cert)Asish Verma
 
Pro lab synopsis (body)
Pro lab synopsis (body)Pro lab synopsis (body)
Pro lab synopsis (body)Asish Verma
 
Microsoft project (msp) group 6
Microsoft project (msp)  group 6Microsoft project (msp)  group 6
Microsoft project (msp) group 6Asish Verma
 

Más de Asish Verma (13)

Major seminar presentation Cloud Computing
Major seminar presentation Cloud Computing Major seminar presentation Cloud Computing
Major seminar presentation Cloud Computing
 
SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)SITA LAB REPORT (XYBER CRIME)
SITA LAB REPORT (XYBER CRIME)
 
SITA LAB REPORT (I.P)
SITA LAB REPORT (I.P)SITA LAB REPORT (I.P)
SITA LAB REPORT (I.P)
 
Major pro lab synopsis
Major pro lab synopsisMajor pro lab synopsis
Major pro lab synopsis
 
CCNA 1
CCNA 1CCNA 1
CCNA 1
 
CCNA 2
CCNA 2 CCNA 2
CCNA 2
 
MINOR PROZECT REPORT on WINDOWS SERVER
MINOR PROZECT REPORT on WINDOWS SERVERMINOR PROZECT REPORT on WINDOWS SERVER
MINOR PROZECT REPORT on WINDOWS SERVER
 
Pt report(body)
Pt report(body)Pt report(body)
Pt report(body)
 
Pro lab synopsis (cert)
Pro lab synopsis (cert)Pro lab synopsis (cert)
Pro lab synopsis (cert)
 
Pro lab synopsis (body)
Pro lab synopsis (body)Pro lab synopsis (body)
Pro lab synopsis (body)
 
Pt report(cert)
Pt report(cert)Pt report(cert)
Pt report(cert)
 
Asish verma
Asish vermaAsish verma
Asish verma
 
Microsoft project (msp) group 6
Microsoft project (msp)  group 6Microsoft project (msp)  group 6
Microsoft project (msp) group 6
 

Último

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Último (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

SITA LAB PPT (XYBER CRIME)

  • 1. Combating Cyber crimes-Combating Cyber crimes- Law &Law & Enforcement in IndiaEnforcement in India Seminar on Information Technology Acts Submitted to : Mr. Pranjal Bansal BY: Vishal Soni 4th year / 8th Sem Computer Engineering 08CE97
  • 2. Introduction to CyberIntroduction to Cyber crimecrime  Computer CrimeComputer Crime ,, E-E- CrimeCrime,, Hi-Tech CrimeHi-Tech Crime oror Electronic CrimeElectronic Crime isis where awhere a computercomputer is theis the target of atarget of a crimecrime or is theor is the means adopted to commit ameans adopted to commit a crime.crime.  Most of these crimes areMost of these crimes are not new. Criminals simplynot new. Criminals simply devise different ways todevise different ways to undertake standard criminalundertake standard criminal activities such asactivities such as fraudfraud,, theft, blackmail, forgery,theft, blackmail, forgery, and embezzlement usingand embezzlement using the new medium, oftenthe new medium, often involving the Internetinvolving the Internet
  • 3. Computer vulnerabilityComputer vulnerability  Computers store huge amounts of data in small spacesComputers store huge amounts of data in small spaces  Ease of accessEase of access  Complexity of technologyComplexity of technology  Human errorHuman error  One of the key elements that keeps most members of any societyOne of the key elements that keeps most members of any society honest is fear of being caught — the deterrence factor. Cyberspacehonest is fear of being caught — the deterrence factor. Cyberspace changes two of those rules. First, it offers the criminal an opportunitychanges two of those rules. First, it offers the criminal an opportunity of attacking his victims from the remoteness of a different continentof attacking his victims from the remoteness of a different continent and secondly, the results of the crime are not immediately apparent.and secondly, the results of the crime are not immediately apparent.  Need new laws and upgraded technology to combat cyber crimesNeed new laws and upgraded technology to combat cyber crimes
  • 4. Types of Cyber crimesTypes of Cyber crimes  Credit card fraudsCredit card frauds  Cyber pornographyCyber pornography  Sale of illegal articles-Sale of illegal articles- narcotics, weapons, wildlifenarcotics, weapons, wildlife  Online gamblingOnline gambling  Intellectual Property crimes-Intellectual Property crimes- software piracy, copyrightsoftware piracy, copyright infringement, trademarksinfringement, trademarks violations, theft of computerviolations, theft of computer source codesource code  Email spoofingEmail spoofing  ForgeryForgery  DefamationDefamation  Cyber stalking (section 509Cyber stalking (section 509 IPC)IPC)  PhisingPhising  Cyber terrorismCyber terrorism Crime against persons Crime against Government Crime against property
  • 5. Computer VirusesComputer Viruses  VirusesViruses  A computer virus is aA computer virus is a computer program thatcomputer program that can infect othercan infect other computer programs bycomputer programs by modifying them in suchmodifying them in such a way as to include aa way as to include a (possibly evolved) copy(possibly evolved) copy of it. Note that aof it. Note that a program does not haveprogram does not have to perform outrightto perform outright damage (such asdamage (such as deleting or corruptingdeleting or corrupting files) in order to befiles) in order to be called a "virus".called a "virus". Viruses File infectors Boot record infectors Boot and file viruses
  • 7. Combating cyber crimesCombating cyber crimes  Technological measures-Technological measures- Public key cryptography,Public key cryptography, Digital signatures ,Firewalls,Digital signatures ,Firewalls, honey potshoney pots  Cyber investigation-Cyber investigation- Computer forensics is theComputer forensics is the process of identifying,process of identifying, preserving, analyzing andpreserving, analyzing and presenting digital evidence inpresenting digital evidence in a manner that is legallya manner that is legally acceptable in courts of law.acceptable in courts of law.  These rules of evidenceThese rules of evidence include admissibility (ininclude admissibility (in courts), authenticity (relationcourts), authenticity (relation to incident), completeness,to incident), completeness, reliability and believability.reliability and believability.  Legal framework-laws &Legal framework-laws & enforcementenforcement
  • 8. International initiativesInternational initiatives  Representatives from the 26Representatives from the 26 Council of Europe members, theCouncil of Europe members, the United States, Canada, Japan andUnited States, Canada, Japan and South Africa in 2001 signed aSouth Africa in 2001 signed a convention on cybercrime in effortsconvention on cybercrime in efforts to enhance internationalto enhance international cooperation in combatingcooperation in combating computer-based crimes.computer-based crimes. TheThe Convention on CybercrimeConvention on Cybercrime,, drawn up by experts of the Councildrawn up by experts of the Council of Europe, is designed toof Europe, is designed to coordinate these countries' policiescoordinate these countries' policies and laws on penalties on crimes inand laws on penalties on crimes in cyberspace, define the formulacyberspace, define the formula guaranteeing the efficientguaranteeing the efficient operation of the criminal andoperation of the criminal and judicial authorities, and establishjudicial authorities, and establish an efficient mechanism foran efficient mechanism for international cooperation.international cooperation.  In 1997, TheIn 1997, The G-8 MinistersG-8 Ministers agreedagreed to ten "Principles to Combat High-to ten "Principles to Combat High- Tech Crime" and an "Action PlanTech Crime" and an "Action Plan to Combat High-Tech Crimeto Combat High-Tech Crime."."  Main objectives-Main objectives-  Create effective cyber crimeCreate effective cyber crime lawslaws  Handle jurisdiction issuesHandle jurisdiction issues  Cooperate in internationalCooperate in international investigationsinvestigations  Develop acceptableDevelop acceptable practices for search andpractices for search and seizureseizure  Establish effectiveEstablish effective public/private sectorpublic/private sector interactioninteraction
  • 9. Frequency of incidents of Cyber crimes in India Source: Survey conducted by ASCL Denial of Service: Section 43 Virus: Section: 66, 43 Data Alteration: Sec. 66 U/A Access: Section 43 Email Abuse: Sec. 67, 500, Other IPC Sections Data Theft: Sec 66, 65 99
  • 10. 10 No. of Indian web-sites defaced 441 1002 2219 7039 0 1000 2000 3000 4000 5000 6000 7000 8000 1998 1999 2000 2001
  • 11. 11 Number of Indian sites hacked Site of BARC-panic all around 0 6 12 25 0 5 10 15 20 25 1998 1999 2000 2001
  • 12. 2001 CSI/FBI Computer Crime and Security Survey Of the organizations suffering security compromises in the last year– 95% had Firewalls and 61%had IDSs 981009896Anti-virus software 90929389Access Control %%%% SECURITY TECHNOLOGIES USED 64626150Encrypted Files 95789181Firewalls 61504235Intrusion Detection Systems 2001200019991998 •False sense of security – “We already have a Firewall” 12
  • 13. What is India inc’s biggestWhat is India inc’s biggest threat?threat?  Cyber crime is now a bigger threat to India Inc thanCyber crime is now a bigger threat to India Inc than physical crime. In a recent survey by IBM, a greaterphysical crime. In a recent survey by IBM, a greater number of companies (44%) listed cyber crime as anumber of companies (44%) listed cyber crime as a bigger threat to their profitability than physical crimebigger threat to their profitability than physical crime (31%).(31%). The cost of cyber crime stems primarily from loss ofThe cost of cyber crime stems primarily from loss of revenue, loss of market capitalisation, damage torevenue, loss of market capitalisation, damage to the brand, and loss of customers, in that order.the brand, and loss of customers, in that order. About 67% local Chief Information Officers (CIOs)About 67% local Chief Information Officers (CIOs) who took part in the survey perceived cyber crimewho took part in the survey perceived cyber crime as more costly, compared to the global benchmarkas more costly, compared to the global benchmark of 50%.of 50%.
  • 14. Combating Cyber crime-Combating Cyber crime- Indian legal frameworkIndian legal framework  Information Technology Act, 2000-came into force on 17Information Technology Act, 2000-came into force on 17 October 2000October 2000  Extends to whole of India and also applies to any offence orExtends to whole of India and also applies to any offence or contravention there under committed outside India by anycontravention there under committed outside India by any person {section 1 (2)}person {section 1 (2)}  read with Section 75- Act applies to offence or contraventionread with Section 75- Act applies to offence or contravention committed outside Indiacommitted outside India by any personby any person irrespective of hisirrespective of his nationality,nationality, if such act involves a computer, computer systemif such act involves a computer, computer system oror network located in Indianetwork located in India  Section 2 (1) (a) –”Access” means gaining entry intoSection 2 (1) (a) –”Access” means gaining entry into ,instructing or communicating with the logical, arithmetic or,instructing or communicating with the logical, arithmetic or memory function resources of a computer, computermemory function resources of a computer, computer resource or networkresource or network  IT Act confers legal recognition to electronic records andIT Act confers legal recognition to electronic records and digital signatures (section 4,5 of the IT Act,2000)digital signatures (section 4,5 of the IT Act,2000)
  • 15. Civil Wrongs under ITCivil Wrongs under IT ActAct  Chapter IX of IT Act, Section 43Chapter IX of IT Act, Section 43  WhoeverWhoever without permissionwithout permission of owner of theof owner of the computercomputer – Secures access (mere U/A access)Secures access (mere U/A access)  Not necessarily through a networkNot necessarily through a network – Downloads, copies, extracts any dataDownloads, copies, extracts any data – Introduces or causes to be introduced any viruses orIntroduces or causes to be introduced any viruses or contaminantcontaminant – Damages or causes to be damaged any computerDamages or causes to be damaged any computer resourceresource  Destroy, alter, delete, add, modify or rearrangeDestroy, alter, delete, add, modify or rearrange  Change the format of a fileChange the format of a file – Disrupts or causes disruption of any computer resourceDisrupts or causes disruption of any computer resource  Preventing normal continuance ofPreventing normal continuance of
  • 16. – Denies or causes denial of access by any meansDenies or causes denial of access by any means  Denial of service attacksDenial of service attacks – Assists any person to do any thing aboveAssists any person to do any thing above  Rogue Websites, Search Engines, Insiders providingRogue Websites, Search Engines, Insiders providing vulnerabilitiesvulnerabilities – Charges the services availed by a person to theCharges the services availed by a person to the account of another person by tampering oraccount of another person by tampering or manipulating any computer resourcemanipulating any computer resource  Credit card frauds, Internet time theftsCredit card frauds, Internet time thefts – Liable to pay damages not exceeding Rs. OneLiable to pay damages not exceeding Rs. One crore to the affected partycrore to the affected party – Investigation byInvestigation by – ADJUDICATING OFFICERADJUDICATING OFFICER – Powers of a civil courtPowers of a civil court
  • 17. Section 65: Source CodeSection 65: Source Code  Most important asset of software companiesMost important asset of software companies  ““Computer Source Code" means the listingComputer Source Code" means the listing of programmes, computer commands,of programmes, computer commands, design and layoutdesign and layout  IngredientsIngredients – Knowledge or intentionKnowledge or intention – Concealment, destruction, alterationConcealment, destruction, alteration – computer source code required to be kept orcomputer source code required to be kept or maintained by lawmaintained by law  PunishmentPunishment – imprisonment up to three years and / orimprisonment up to three years and / or – fine up to Rs. 2 lakhfine up to Rs. 2 lakh
  • 18. Section 66: Hacking • Ingredients – Intention or Knowledge to cause wrongful loss or damage to the public or any person – Destruction, deletion, alteration, diminishing value or utility or injuriously affecting information residing in a computer resource • Punishment – imprisonment up to three years, and / or – fine up to Rs. 2 lakh • Cognizable, Non Bailable, 18 Section 66 covers data theft aswell as data alterationSection 66 covers data theft aswell as data alteration
  • 19. Sec. 67. PornographySec. 67. Pornography  IngredientsIngredients – Publishing or transmitting or causing to be publishedPublishing or transmitting or causing to be published – in the electronic form,in the electronic form, – Obscene materialObscene material  PunishmentPunishment – On first convictionOn first conviction  imprisonment of either description up to five years andimprisonment of either description up to five years and  fine up to Rs. 1 lakhfine up to Rs. 1 lakh – On subsequent convictionOn subsequent conviction  imprisonment of either description up to ten years andimprisonment of either description up to ten years and  fine up to Rs. 2 lakhfine up to Rs. 2 lakh  Section coversSection covers – Internet Service Providers,Internet Service Providers, – Search engines,Search engines, – Pornographic websitesPornographic websites  Cognizable, Non-Bailable, JMIC/ Court of SessionsCognizable, Non-Bailable, JMIC/ Court of Sessions
  • 20. Sec 69: Decryption ofSec 69: Decryption of informationinformation  IngredientsIngredients – Controller issues order to Government agency toController issues order to Government agency to intercept any information transmitted through anyintercept any information transmitted through any computer resource.computer resource. – Order is issued in the interest of theOrder is issued in the interest of the  sovereignty or integrity of India,sovereignty or integrity of India,  the security of the State,the security of the State,  friendly relations with foreign States,friendly relations with foreign States,  public order orpublic order or  preventing incitement for commission of a cognizablepreventing incitement for commission of a cognizable offenceoffence – Person in charge of the computer resource fails toPerson in charge of the computer resource fails to extend all facilities and technical assistance toextend all facilities and technical assistance to decrypt the information-punishment upto 7 years.decrypt the information-punishment upto 7 years.
  • 21. Sec 70 Protected SystemSec 70 Protected System  IngredientsIngredients – Securing unauthorised access or attempting toSecuring unauthorised access or attempting to secure unauthorised accesssecure unauthorised access – to ‘protected system’to ‘protected system’  Acts covered by this section:Acts covered by this section: – Switching computer on / offSwitching computer on / off – Using installed software / hardwareUsing installed software / hardware – Installing software / hardwareInstalling software / hardware – Port scanningPort scanning  PunishmentPunishment – Imprisonment up to 10 years and fineImprisonment up to 10 years and fine  Cognizable, Non-Bailable, Court of SessionsCognizable, Non-Bailable, Court of Sessions
  • 22. Cyber crimes punishableCyber crimes punishable under various Indianunder various Indian lawslaws Sending pornographic or obscene emails are punishable under Section 67 of the IT Act.  An offence under this section is punishable on first conviction with imprisonment for a term, which may extend to five years and with fine, which may extend to One lakh rupees.  In the event of a second or subsequent conviction the recommended punishment is imprisonment for a term, which may extend to ten years and also with fine which may extend to Two lakh rupees.  Emails that are defamatory in nature are punishable under Section 500 of the Indian Penal Code (IPC), which recommends an imprisonment of upto two years or a fine or both.  Threatening emails are punishable under the provisions of the IPC pertaining to criminal intimidation, insult and annoyance (Chapter XXII), extortion (Chapter XVII)  Email spoofing Email spoofing is covered under provisions of the IPC relating to fraud, cheating by personation (Chapter XVII), forgery (Chapter XVIII)
  • 23. Arms ActOnline sale of Arms Sec. 383 IPCWeb-Jacking NDPS ActOnline sale of Drugs Sec 416, 417, 463 IPCEmail spoofing Sec 420 IPCBogus websites, cyber frauds Sec 463, 470, 471 IPCForgery of electronic records Sec 499, 500 IPCSending defamatory messages by email Sec 503 IPCSending threatening messages by email Computer Related Crimes under IPC and Special Laws 23
  • 24. Better EnforcementBetter Enforcement initiativesinitiatives  Mumbai Cyber lab is a joint initiative of Mumbai police andMumbai Cyber lab is a joint initiative of Mumbai police and NASSCOM –more exchange and coordination of this kindNASSCOM –more exchange and coordination of this kind  Suggested amendments to the IT Act,2000-new provisions forSuggested amendments to the IT Act,2000-new provisions for child pornography, etcchild pornography, etc  More Public awareness campaignsMore Public awareness campaigns  Training of police officers to effectively combat cyber crimesTraining of police officers to effectively combat cyber crimes  More Cyber crime police cells set up across the countryMore Cyber crime police cells set up across the country  Effective E-surveillanceEffective E-surveillance  Websites aid in creating awareness and encouragingWebsites aid in creating awareness and encouraging reporting of cyber crime cases.reporting of cyber crime cases.  Specialised Training of forensic investigators and expertsSpecialised Training of forensic investigators and experts  Active coordination between police and other law enforcementActive coordination between police and other law enforcement agencies and authorities is required.agencies and authorities is required.